Login / Signup
Experience with the host identity protocol for secure host mobility and multihoming.
Thomas R. Henderson
Jeffrey M. Ahrenholz
Jae H. Kim
Published in:
WCNC (2003)
Keyphrases
</>
data sets
cloud computing
identity management
human mobility
information systems
database systems
mobile phone
lightweight
mobile agents
user experience
mobile networks
security mechanisms
key exchange
mobility patterns